Content



Awesome Awesomeness

Infosec_Reference (github source) - “an information security reference that doesn’t suck”

Information Security forum

National Security Agency github - national security agency proposals on enhansing future world’s security



Binary:


top vulnerabilities

security groups

studying



Pentest linux distributions


Distro Tools List - list of security linux destributives
Лучшие дистрибутивы для проведения тестирования на проникновение


Caution! - hackers hack other hackers - divide your personal accounts/environment and your working pentest env.
Caution! - Kali linux, etc. has a lots of built-in tools, which is not really thoroughly checked for vulnerabilities, therefore all hacking destributions is highly dangerous.



Methodologies


Penetration testing methodologies (owasp):

Attacks-centered methodologies:



Courses and certifications


Diagram. Choosing the certificate:

Certifications:

Career paths:

Some examination mediators:

Courses:

About some courses:



Vulnerabilities register


CVE - Common Vulnerabilities and Exposures
CWE - Common Weakness Enumeration specification
CPE - Common Platform Enumeration (official dictionary)


  • CWE - by NVD, by mitre
  • CVSS v2 - common vulnerability scoring system
  • NVD - national vulnerability database
  • CVE - common vulnerabilities and exposures
    cve.mitre downloads
  • OVAL - open vulnerability and assessment language
  • snyk.io - this site can be google-dorked for vulnerabilities, e.g. jquery site:snyk.io




Interesting bookmarks


Cryptography:

Network:

Reverse:

Unclassified

Hack Android using metasploit without port forwarding over internet - 2017

(RU) Атака на беспроводные сети Wifi. Чуть меньше теории и чуть больше практики (хабр)